Abstract
Image authentication is a challenging area of growing importance. Although a number of image authentication systems have been proposed in recent years but less attention has been paid to their evaluation. In this paper we analyze the JPEG compression tolerant image authentication scheme SARI [1], and show a number of ways of constructing fraudulent images that pass the verification test, hence defeating the system claimed security. We then show methods of modifying the system to make the attacks ineffective.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lin, Ching-Yung, Chang, Shih-Fu: Robust Image Authentication Method Surviving JPEG Lossy Compression. Storage and Retrieval for Image and Video Databases (SPIE) (1998) 296–307
ITU: JPEG Standard: CCITT Recommendation T.81. International Telecommunication union (1993)
Ahmed, N., Natarajan, T., Rao, K.R.: Discrete Cosine Transform. IEEE Trans. on Computers C-23 (1974) 90–93
Radhakrishnan, R., Memon,6N.: On the Security of the SARI Image Authentication System. Proc. of International Conference on Image Processing vol 3 (2001) 971–974
Kuribayashi, Minoru, Tanaka, Hatsukazu: A Watermarking Scheme Based on the Characteristic of Addition among DCT coefficients. Proc. of ISW2000 (2000) 1–14
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Uehara, T., Safavi-Naini, R. (2002). On (In)security of “A Robust Image Authentication Method”. In: Chen, YC., Chang, LW., Hsu, CT. (eds) Advances in Multimedia Information Processing — PCM 2002. PCM 2002. Lecture Notes in Computer Science, vol 2532. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36228-2_127
Download citation
DOI: https://doi.org/10.1007/3-540-36228-2_127
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00262-8
Online ISBN: 978-3-540-36228-9
eBook Packages: Springer Book Archive